AUTHOR ARCHIVES

Alexander Abad-Santos

February 1, 2013
FROM NEXTGOV
Want one more sign that North Korea is getting closer to their third nuclear test? They've started to camouflage and cover the entrance to an underground nuclear testing tunnel at the Punggye-ri facility so that no one can see what they're doing. "Analysis showed a camouflage net looking like a...

January 31, 2013
FROM NEXTGOV
There are two countries in this world that we'd rather not see tinker with nuclear energy: Iran and North Korea. And it just so happens one of those is now prepping for a nuclear test, while the other is bragging about how it's putting its program into overdrive. Let's start...

January 29, 2013
FROM NEXTGOV
Thanks to citizen cartographers, Google is finally able to fill in one of the last blank spaces on its version of Earth. Last night, the company added North Korea to vast database, and now we can see things like the Hermit Kingdom's mass transit routes, Pyongyang's parks, and even the...

January 23, 2013
FROM NEXTGOV
Make fun of iPhone 5s and their terrible maps all you want, but the next time you're in an Algerian hostage situation, running for your life 20 miles across the desert with almost no water and no real idea where to go, remember that Apple phone's native Compass app just...

January 22, 2013
In her first interview since the bottom of the David Petreaus scandal fell out, the "other other woman" Jill Kelley told The Daily Beast's Howard Kurtz that Paula Broadwell is one scary cyberbully; that those 30,000 e-mails with General John Allen were more like hundreds; and that she's sorta like...

January 21, 2013
In 2009 Chief Justice John Roberts flipped some very important words in President Obama's swearing-in. Four years later, it appears the two still haven't figured out how to do get this tradition quite right. Click here to read more on the big "oops" moment from The Atlantic Wire.

January 18, 2013
The Algerian hostage situation is about as serious as its details are hazy, but as it enters its third day reports are emerging that the U.S. Air Force "is in the process of evacuating Americans and other individuals." Algerian state television reported this morning that Thursday's suspect mission by Algeria's...

January 16, 2013
In a leak that could signal a crossing of President Obama's "red line" on the increasingly deadly conflict in Syria, the State Department has investigated and concluded that Syrian President Bashar al-Assad and his military forces used poison gas in a deadly attack on the city of Homs last month,...

January 16, 2013
President Obama has one more position to fill in his second-term cabinet. Following the departures of Hillary Clinton, Leon Panetta, Timothy Geithner, and Hila Solis, sources in the administration have confirmed that his Interior Secretary, Ken Salazar, will be leaving. "Salazar is expected to broadly announce his departure Wednesday. He...

January 9, 2013
FROM NEXTGOV
As Bill Richardson and Eric Schmidt's excellent adventure to the Internet Black Hole known as North Korea carries on, the former New Mexico governor and Google chair visited some of the only people in the country who are allowed access to the Internet: the students at Kim Il Sung University....

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.